Policy
Disable new DMA devices when this computer is locked
Windows 11 25H2
Policy overview
Key metadata and intent for this policy.
Supported OS tags: Windows10, Windows10RT, Windows11, WindowsServer2016
This policy setting allows you to block direct memory access (DMA) for all Thunderbolt hot pluggable PCI downstream ports until a user logs into Windows. Once a user logs in, Windows will enumerate the PCI devices connected to the host Thunderbolt PCI ports. Every time the user locks the machine, DMA will be blocked on hot plug Thunderbolt PCI ports with no children devices, until the user logs in again. Devices which were already enumerated when the machine was unlocked will continue to function until unplugged or the system is rebooted or hibernated. This policy setting is only enforced when BitLocker or device encryption is enabled. Note: Some PCs may not be compatible with this policy if the system firmware enables DMA for newly attached Thunderbolt devices before exposing the new devices to Windows.
Registry values
How enabled and disabled states update the registry.
| Registry location | Type | Enabled value | Disabled value |
|---|---|---|---|
| HKLM\Software\Policies\Microsoft\FVE\DisableExternalDMAUnderLock | REG_DWORD | 1 | 0 |
Policy elements
Inputs and configuration options exposed by this policy.
This policy has no additional user input fields.
Other policies in this category
Explore related policies at the same level.
- ComputerChoose default folder for recovery passwordAt least Windows Vista
- ComputerChoose drive encryption method and cipher strength (Windows 10 [Version 1511] and later)At least Windows Server 2016, Windows 10
- ComputerChoose drive encryption method and cipher strength (Windows 8, Windows Server 2012, Windows 8.1, Windows Server 2012 R2, Windows 10 [Version 1507])At least Windows Server 2012, Windows 8 or Windows RT
- ComputerChoose drive encryption method and cipher strength (Windows Vista, Windows Server 2008, Windows 7, Windows Server 2008 R2)Windows Server 2008, Windows 7, and Windows Vista
- ComputerChoose how users can recover BitLocker-protected drives (Windows Server 2008 and Windows Vista)Windows Server 2008 and Windows Vista
- ComputerPrevent memory overwrite on restartWindows Server 2012 R2, Windows 8.1, Windows Server 2012, Windows 8, Windows Server 2008, Windows 7, and Windows Vista
- ComputerProvide the unique identifiers for your organizationAt least Windows Server 2008 R2 or Windows 7
- ComputerStore BitLocker recovery information in Active Directory Domain Services (Windows Server 2008 and Windows Vista)Windows Server 2008 and Windows Vista
- ComputerValidate smart card certificate usage rule complianceAt least Windows Server 2008 R2 or Windows 7